Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Bugs Bite Juniper, Cisco: Page 2 of 3

The problem goes to show that vulnerabilities can crop up in any software, no matter how carefully controlled the release process is. Unlike Cisco Systems Inc. (Nasdaq: CSCO), which supports multiple "trains" of its Internetwork Operating System (IOS), Juniper keeps all of its M- and T-series routers on the same version of the Junos software. Junos updates are released once per quarter, without exception; any features that aren't fully tested or debugged are put off until the next release.

As for Cisco, the company revealed this week that it had discovered three more glitches in IOS that could leave routers prone to DOS attacks. In each case, the problem affects only certain versions of IOS. The three latest discoveries are:

  • MPLS: If an interface not configured for MPLS receives an MPLS packet, the port could reset "and may take several minutes to become fully functional," the Cisco advisory reads. The problem goes away if every port has MPLS for IP enabled, or if MPLS traffic engineering is turned on. This glitch affects only a subset of Cisco's smaller routers, including the 2600, 2800, and 3800. Cisco's Catalyst line is unaffected, as are the 7200, 7500, and GRS 12000.
  • BGP: If a BGP neighbor change is logged, and a "malformed" BGP packet is in queue at the time, a reset could occur. This flaw affects any Cisco box running IOS with BGP configured.
  • IPv6: Cisco has discovered a processing flaw related to logical interfaces, such as IPv6-to-IPv4 tunnels. "Crafted" packets sent repeatedly across such an interface can trigger a system reload, according to the advisory.

A Cisco spokesman notes the company doesn't typically comment on IOS glitches beyond what's mentioned in the security advisories, which are posted at http://www.cisco.com/en/US/products/products_security_advisories_listing.html.

Craig Matsumoto, Senior Editor, Light Reading